figure out what blockchain and distributed
ledger technologies are all about, this could be a great entry point.
More details below. Use blockchain395 to activate course discount. Hope
some of you decide to join!
Cheers,
Nick
***
Nick Martin
Founder & CEO, TechChange
M 240 505
; and
use the code AI395 to lock in a discount.
Have an idea for something we should include in the curriculum? Send us an
email at i...@techchange.org. Happy to share our working syllabus upon
request.
Hope some of you decide to join us,
Nick
***
*AI for International Development*
*April 23r
u!
Cheers,
Nick
***
Nick Martin
Founder & CEO, TechChange
M 240 505 2324 | www.techchange.org | @ncmart
<http://www.twitter.com/ncmart>
<http://www.facebook.com/techchange> <http://www.twitter.com/techchange>
<https://www.linkedin.com/in/nicholascmartin>
Check out
should we be including, both
critical and optimistic perspectives - we're eager to hear from you!
If you'd like to join for the course. Use "libtech345" to get a discount on
course price.
Cheers,
Nick
***
Nick Martin
Founder & CEO, TechChange
M 240 505 2324 | www.techchange
questions about the fellowship or the IFF, please ask!
https://internetfreedomfestival.org/2018-fellowship/
The process closes June 30.
Also RT!: https://twitter.com/InternetFF/status/871785282051358720
Thanks!
--
Nick Farr
Community Coordinator, Internet Freedom Festival
US: +1 203 441 3277
Hi Richard,
The OONI project [1] (Open Observatory of Network Interference)
produces country by country breakdowns of the types of censorship
techniques occurring.
[1]: https://ooni.torproject.org/
The project has a set of tests which attempt to determine exactly how
content is getting blocked
, Enigmail, or
CodeCrypt.
-- Nick Doiron
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change password by emailing moder
's shaping up to be a fantastic course.
Let me know if you’d like to enroll, happy to extend the discount price of $
295 if you use the discount code “agtech295”. Feel free to share with other
colleagues if you think they'd be interested.
And don't hesitate to reach out with any questions.
Che
any course for 295.
Cheers and hope to see some of you in class!
Nick
***
[image: Inline image 1]
Nick Martin
Founder & CEO, TechChange
M 240 505 2324 | www.techchange.org | @ncmart
<http://www.twitter.com/ncmart>
<http://www.facebook.com/techchange> <http
a
5-day orientation in Washington, D.C., and job placement.
Download the diploma catalog
<https://www.techchange.org/wp-content/uploads/2015/10/Diploma-Track-Brochure_101415_v7sm.pdf>
Cheers,
Nick
***
[image: Inline image 1]
Nick Martin
Founder & CEO, TechChange
M 240 505 2324 | w
ute the fellowship. I’ve attached a flyer, so feel free to
post it on a message board or wherever you see fit.
Happy Holidays!
Nick
***
[image: Inline image 1]
Nick Martin
Founder & CEO, TechChange
M 240 505 2324 | www.techchange.org | @ncmart
<http://www.twitter.com/ncmart>
<htt
Quoth carlo von lynX:
> I haven't found any place that offers an independently built
> Android binary for Signal.
I use an independently built binary from the repository here[0], and
know others who do the same (or build their own).
I would be more concerned about some undercover NSA employee
know them.
Regards, Nick
> On 26 Oct 2015, at 18:42, Arzak Khan <direc...@ipop.org.pk> wrote:
>
> Dear All,
>
> A major earthquake measuring 8.1 on Richter scale has struck remote northeast
> region in Afghanistan and northern areas of Pakistan killing more than 200
&g
Phew, the first Tor relay of the Library Freedom Project has been
reinstated. Delightful news.
- Forwarded message from Free Software Foundation -
Dear free software supporter,
In July, Kilton Library in Lebanon, New Hampshire set up a relay server in the
Tor network,
, Aug 19, 2015 at 2:41 PM, Nick Skelsey nskel...@gmail.com wrote:
Hi All,
A friend and I have been working on (yet another) anti-censorship tool and
we are getting ready to release it. The tool is kind of like a BBS, but the
interesting thing about it is that all public statements made through
of posts in the blockchain or entire posts?
also what blockchain are you using?
On Tue, Aug 25, 2015 at 3:01 PM, Nick Skelsey nskel...@gmail.com wrote:
I am bumping this post just once.
I was hoping to see if anybody had any hold on kind of thoughts before
we continue on our merry way building
Steve,
My responses are inline. Thanks for the questions!
On Tue, Aug 25, 2015 at 11:35 AM, Steve Weis stevew...@gmail.com wrote:
Hi Nick. I'll throw out some questions:
- The Bitcoin blockchain is 40GB and growing at about 4GB a month.
Will end users have to download that much data
to talk to one of our advisors.
Cheers,
Nick
-- Forwarded message --
From: TechChange dipl...@techchange.org
Date: Thu, Aug 20, 2015 at 4:24 PM
Subject: We've got a MAJOR announcement...
To: n...@techchange.org
We've got big news! View this email in your browser
http://us1.campaign
presentations about a relevant topic to the class. Let us know
if you're interested.
Cheers,
Nick
***
Basics of Digital Safety
https://www.techchange.org/online-courses/basics-of-digital-safety/
August 17th- September 11th
Course Description
In our digitally connected world, new risks to our
Quoth Richard Brooks:
Is Ostel functional? Have issues getting it to work,
the CsipSimple echo appears not to be functional.
FWIW I used it with Jitsi (Debian) on one end and CSipSimple (cheap
Android tablet) with success many times last year, audio only.
Haven't used it recently, but it
Done!
On 28 Apr 2015, at 22:12, Indiver Badal i...@indiver.com wrote:
Hi Nick
Sure, please add me to the list. I'm ready to assist in any way I can.
Thanks
Indiver
On Tue, Apr 28, 2015, 12:12 AM Nick Ashton-Hart nash...@consensus.pro
mailto:nash...@consensus.pro wrote:
+ Indiver
to help: http://kathmandulivinglabs.org/
On Mon, Apr 27, 2015 at 8:53 AM, Yosem Companys compa...@stanford.edu wrote:
From: Nick Ashton-Hart nash...@consensus.pro via bestb...@lists.bestbits.net
If you, or someone you know, has hands-on ICTs and especially telecom
infrastructure experience
:
Dibya Khatiwada and Rustan Shrestha. The more the merrier!
On 27 Apr 2015, at 20:12, Bill Woodcock wo...@pch.net wrote:
On Apr 27, 2015, at 5:53 AM, Yosem Companys compa...@stanford.edu wrote:
From: Nick Ashton-Hart nash...@consensus.pro via
bestb...@lists.bestbits.net
If you, or someone you
Quoth z...@manian.org:
The people on Indiegogo project look legit and their comments line up with
what I know about the space.
An open source 3 or 4g baseband would be huge boon to anonymity and
countersurveillance efforts.
Anyone have further references on the project creators?
Search
-printing-prosthetics/.
Once you have registered, you will receive an email about an hour before
the event begins with a reminder and link to join. You will not need to
register again if you register early.
Cheers,
Nick
***
e-NABLE http://enablingthefuture.org/ is a global online community
Quoth Griffin Boyce:
[1] for comparison, downloads through Satori have been around 82k
from AWS since March.
That's great, too, Griffin! Is that 82k from Iran, or in total?
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
-election-observer-iwatch/
Hope you have a chance to join us,
Nick
==
TC103: Tech Tools and Skills for Emergency Management
This four-week online professional development certificate course will
explore how new communication and mapping technologies are being used to
respond to disasters, create
are ignorant enough of how
computers actually work to not realise the sacrifices they're
making, but I don't think this article is targeted for them.
Nick
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu
Quoth Graham Donaldson:
I thought Elliptic Curve has been considered an NSA plant for some
time now... the article seems a bit late to the party?
Did you read the article? It is about the report NIST commissioned
in response to the Dual Elliptic Curve discovery, and their thoughts
on NSA
Quoth edhelas:
What about a Torrent ? We can easily share the magnet everywhere
Note that there is a torrent of the cryptome archive up to 2011:
magnet:?xt=urn:btih:ba401110a60ad844a09d4219e5f95a46385f7410
But yes, bittorrent seems like a reasonable way to distribute this
sort of stuff. That
Quoth coderman:
based on feedback, here is what i intend:
1. A torrent of:
USB-1.rar
USB-2.rar
Update-13-1231.rar
Could you do tarballs or zip files, rather than rar files? They're
much easier to deal with than recent rars using free software (the
only program I know that will do it is
), but I didn't realise that was already widely deployed.
It's probably a combination of several horrible technologies.
Nick
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo
have it
seems like a reasonable step 0 to me.
Nick
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change password by emailing
Quoth coderman:
anyone know where to obtain a stand-alone video file for DL?
(any encodings OK...)
Part 1: magnet:?xt=urn:btih:71678c3be35556b49ae8cf1c8657d067052cf827
Part 2: magnet:?xt=urn:btih:d6d534d1de3ad8ae995313636d2e437941c107b9
--
Liberationtech is public archives are searchable on
and not noticed much at all), but maybe they just
haven't considered it yet.
The problem is that people might visit websites that fully or
partially identify them, and then follow links to sites that will then
track/log the HTTP 'referer' information.
Yeah, sounds like a reasonable concern to me.
Nick
and not noticed much at all), but maybe they just
haven't considered it yet.
The problem is that people might visit websites that fully or
partially identify them, and then follow links to sites that will then
track/log the HTTP 'referer' information.
Yeah, sounds like a reasonable concern to me.
Nick
Thanks for the recommendation, I look forward to watching this soon.
Requires Flash
There are copies that don't require flash available from torrent
websites, thankfully.
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
Quoth Andrew Cady:
Appparently what is hard-coded into the source is the default value
of com.google.Chrome.ExtensionInstallSources. (Also hard-coded, I
presume, is the SSL certificate for the domain.)
You can override the defaults, though, so maybe I've overstated it.
Here is how:
Quoth Andrew Cady:
On Sat, May 03, 2014 at 12:35:39PM -0400, Nick wrote:
if you're worried about an evil google, hey, they control the
browser, so you've already lost.
I use Chromium and update it through my distro, so no, Google
does not control the browser (/usr/bin/chromium).
Me too
of the extension's
control, and besides, if you're worried about an evil google, hey,
they control the browser, so you've already lost.
Nick
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu
Quoth Griffin Boyce:
Nick wrote:
Can you definitely not sign extensions with a private key?
This is not an option available to any of my extensions or apps,
unfortunately. There's reference to it in the documentation, but
I've never seen this as an option for apps or for my developer
Quoth carlo von lynX:
At least DDG doesn't correlate search strings to Google identification
cookies,
so that is something better than nothing, but still..
I think that's actually a very significant usability improvement.
Sure you can tell people don't allow cookies for google, unless you
Quoth Jonathan Wilkes:
Has anyone seen this:
http://media.libreplanet.org/u/zakkai/m/free-software-for-freedom-surveillance-and-you/
If that is indeed what people saw when they watched a live stream going over
Tor, I'm very impressed. Interested to know more about the setup.
Yep, and it
On Thu, Feb 27, 2014 at 03:31:14PM +, Yishay Mor wrote:
https://twitter.com/guardiannews/status/439059744678887424/photo/1
For those who don't enjoy being treated like cattle, prodded to
open links with zero information as to why, the tweet in question
reads:
It's not like they're peering
it was inevitable, but if an Android client can do good
video, then presumably laptops ought to manage it too.
Thanks,
Nick
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech
Despite the provenence of the story, I'm still suprised there was no
mention of Google's cooperation with repressive elements of its own
government through PRISM and the like. Or (though this is probably
far too optimistic) a mention of whether surveillance as overarching
paradigm is
On Tue, Oct 15, 2013 at 11:49:46AM +0200, Moritz Bartl wrote:
A self-hosted mail provider will obviously *not* help much against NSAs
mass collection of emails and email addresses. Don't sell it as a
solution in this context.
Well the article seems to be talking about address books, as
opposed
On Fri, Oct 04, 2013 at 10:03:11AM -0400, Nathan of Guardian wrote:
Oh, yes... we are working on an improved Jitsi setup tutorial, but for
now, it is all here:
Brilliant, thanks for sharing. Would it be feasible and easy to work
with Jitsi to have some sort of first startup thing where you
On Sat, Sep 21, 2013 at 08:14:08AM -0400, Nathan of Guardian wrote:
If you want to make plain old telephone calls through a service like
Callcentric, I think you can also find a workeable solution for the NAT
issue, but I don't have it documented exactly.
The other aspect of this setup is
Quoth Nathan of Guardian:
I've talked about this before, but the use of a MiFi portable
network device providing wifi to a tablet/phablet running VoIP
software on a clean ROM, provides the best of all worlds - telephony,
portability and security.
I lived life this way for awhile in New
On Fri, Aug 09, 2013 at 11:26:21AM +0300, Nadim Kobeissi wrote:
On 2013-08-08, at 11:53 PM, Mike Perry mikepe...@torproject.org wrote:
It is profoundly encouraging to see that people of such courage and
integrity as the Lavabit staff exist, and are willing to put everything
on the line to
Quoth Werner Koch:
On Wed, 31 Jul 2013 19:30, adrela...@riseup.net said:
verification is the least secure method, to the download page? (You can
see the design here: [3])
A: 1 in ~11 users.
Actually [3] is the same URL as [1].
3 should be this:
[3]:
On Thu, Jul 25, 2013 at 11:19:22AM +0200, Eugen Leitl wrote:
(See also https://en.wikipedia.org/wiki/Convergence_(SSL) )
Would Convergence help here? I can't see how. If a government
secretly aquired the SSL private keys for a site, and the site
continued using them, then no convergence notary
On Thu, Jul 25, 2013 at 04:14:56AM -0700, Mitar wrote:
Some very good arguments *for* DRM on the web:
http://unitscale.com/mb/bomb-in-the-garden/
That's a very interesting article. Though the author isn't exactly
arguing for DRM; his last paragraph calls out the W3C for their
recent moves in
Looks like you got your wish:
https://cpunks.org/pipermail/cypherpunks/2013-July/11.html
Quoth Ximin Luo:
+1, especially since we are trying to promote the idea that crypto is *not*
just for terrorists.
If you are trying to make the point that by the govt's definition we are all
Looks like you got your wish:
https://cpunks.org/pipermail/cypherpunks/2013-July/11.html
Quoth Ximin Luo:
+1, especially since we are trying to promote the idea that crypto is *not*
just for terrorists.
If you are trying to make the point that by the govt's definition we are all
could help draft
standards-language for The Responsibilities of Libraries to the Public
but perhaps there's already such a document out there that could be
updated or re-enforced. At this point, I'm trying to start a
discussion.
Thanks for your time,
Nick
0: http://wiki.openitp.org/events:techno
On Wed, Jul 17, 2013 at 12:54 PM, Collin Anderson
col...@averysmallbird.com wrote:
Wait, forgive me Libtech for amusing myself at the cost of your collective
inboxes but, is it just me or is the security page on what purports to be a
security tool empty? https://unsene.com/security.html
It's
On Tue, Jul 16, 2013 at 1:04 AM, Jonathan Wilkes jancs...@yahoo.com wrote:
On 07/15/2013 11:45 PM, Catherine Roy wrote:
As a member of the HTML working group and the Restricted Media community
group, my experience is that discussions within these groups surrounding the
EME draft have been
noone said it would be closed source. That's peoples guess. Like, your
guess, I guess.
According to their twitter account, the answer is maybe:
https://twitter.com/HemlisMessenger/statuses/354927721337470976
Peter Sunde (one of the people behind it) said eventually, but
in my experience
On Wed, Jul 10, 2013 at 12:36 PM, Marcin de Kaminski
mar...@dekaminski.se wrote:
Sorry to ask such a general question but I need input on the issue of
electronic voting. Is there any comprehensive collection of resources or
(preferably academic) research already out there?
--
Too many emails?
Quoth Robert Guerra:
Is the mixmaster network still working? Might that not also be an option to
send email messages anonymously?
Yes, it is still working, albeit with only a few active relays.
Tormail is a lot easier to use, though.
But neither is likely appropriate for Justin, who is
On Mon, Jul 01, 2013 at 07:02:03AM -0400, Tom Ritter wrote:
If libpurple/pidgin itself has bugs, that compromises OTR. If an
attacker gets in through a window or your sliding door, he's still in
your house. And libpurple is full of bugs. That's the easy, go-to
answer for this question.
Quoth Mike Perry:
If you're talking about attacks as strong as end-to-end correlation,
then it turns out hidden services have similar weaknesses on that order.
There are a number of points where the adversary can inject themselves
either to observe or manipulate hidden service circuit
Quoth Mike Perry:
I find StartPage/Google immensely superior to Duckduckgo/Bing when
searching the long tail of technical material (which I do frequently).
In that case I agree StartPage probably makes sense. Search engines
are mainly useful for long tail things; for other stuff I generally
Quoth Mike Perry:
Hidden service circuits require ~4X as many Tor router traversals
as normal Tor exit circuits to set up, and unlike normal Tor exit
circuits, they are often *not* prebuilt. Once they are set up, they
still require 2X as many Tor router traversals end-to-end as normal
Quoth Jacob Appelbaum:
I wonder how it performs for search between https://duckduckgo.com/ and
http://3g2upl4pq6kufc4m.onion - has anyone performed any queries and
computed information about time to connect, delays in searching, etc?
Some kind analysis would be useful. Especially if we compare
article. If Businessweek is a bunch of
lunkheads, then I may have to revise my opinions and suspicions.
Nick
0:
http://www.businessweek.com/articles/2013-03-08/skypes-been-hijacked-in-china-and-microsoft-is-o-dot-k-dot-with-it
--
Too many emails? Unsubscribe, change to digest, or change
in animation so if anyone is interested in having their message or content
animated then let us know.
Cheers,
Nick
***
*TC104: Digital Organizing and Open Government (April 15th - May 10th)*
http://techchange.org/online-courses/global-innovations-for-digital-organizing/
Technological innovation
If you want to jump straight to the data, it's here:
http://cs.unm.edu/~jeffk/tom-skype/
On Fri, Mar 8, 2013 at 7:11 AM, Graham Webster g...@gwbstr.com wrote:
Bloomberg Businessweek reports on a researcher who cracked the list of
sensitive terms that trigger the Chinese TOM-Skype application
Daniel Kahn Gillmor d...@fifthhorseman.net writes:
On 02/15/2013 10:25 PM, Nick M. Daly wrote:
For example, is it acceptable if the client's secret key be exposed
when the box is rooted by attackers? (Probably not, but that does
let the host act as a trust proxy without relying
conceptually interesting trust models).
3. What is the client application delivery model? Is it:
3.A. Browser-based interaction between client and server?
3.B. Browser-plugin-based interaction?
3.C. Appstore-based interaction?
Thanks for your time,
Nick
--
Unsubscribe, change to digest
if anyone in the group knows whether there's any good reason they
should or shouldn't push new certs on all machines at the same time?
(Nick -- would like to see what you have online, but won't blast thru a
certificate warning. Perhaps you have it somewhere else.)
-Sky
On Jan 12, 2013, at 2:57 PM
/
The weirdest part isn't how the 0E:66... certificate disappeared on
November 20th (or December 5th), but how it came back into circulation
on or around December 20th.
Thanks for any clarification you can offer on this situation,
Nick
--
Unsubscribe, change to digest, or change password at:
https
those announcements.
Additionally, while you're complaining about other people's SSL
certificates, you should fix yours. :)
It's broken for a reason, I'm trying something weird.
Nick
--
Unsubscribe, change to digest, or change password at:
https://mailman.stanford.edu/mailman/listinfo
to MITM-based attacks (most worryingly: impersonation,
which allows eavesdropping). That hardly seems appropriate for
journalists, who need to keep their sources and conversations secret
even from state- or law-enforcement-based actors, on occasion.
Thanks for your time,
Nick
then let us know.
Cheers,
Nick
***
*TC104: Digital Organizing and Open Government (Jan 7th - Feb 1st)*
http://techchange.org/online-courses/global-innovations-for-digital-organizing/
Technological innovation is transforming civil society organization and
creating new opportunities for government
years.
Both 2.A and 2.B can be fixed through GPA or another frontend, but
that's still bad key-creation practice.
However, it *does* show the long-form key ID (the last 8 bytes of the
fingerprint), which is probably the minimum necessary to avoid most
collision attacks.
Nick
--
Unsubscribe
Does anybody know what the Y-axis (vertical) scale is on Akamai's
graph? If the scale is in millionths of Mbps (bps) then it's not a
very large change. Also, does the Y-axis start at zero, 12-billion,
or what?
...You'd think a content hosting company could put together a
reasonable usage graph.
.
Nick
--
Unsubscribe, change to digest, or change password at:
https://mailman.stanford.edu/mailman/listinfo/liberationtech
(to
address this at a few different levels) and why this paper was
produced:
http://files.cloudprivacy.net/ssl-mitm.pdf
Nick
--
Unsubscribe, change to digest, or change password at:
https://mailman.stanford.edu/mailman/listinfo/liberationtech
, Nick Daly nick.m.d...@gmail.com wrote:
On Tue, Oct 2, 2012 at 8:41 PM, Maxim Kammerer wrote:
From Security FAQ [3]:
“CryptoHeaven manages public keys automatically and securely. User
simply allows others to communicate with him through the use of
Contacts within the CryptoHeaven system
for your
attackers.
Is there a preferred contribution method? I didn't see one mentioned in
the PDF, but I probably missed it.
Nick
0: http://arstechnica.com/security/2012/08/passwords-under-assault/
--
Unsubscribe, change to digest, or change password at:
https://mailman.stanford.edu
well explained.
Nick
0: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006
1: http://panopticlick.eff.org/
--
Unsubscribe, change to digest, or change password at:
https://mailman.stanford.edu/mailman/listinfo/liberationtech
On Fri, Aug 31, 2012 at 11:23 AM, Matt Mackall wrote:
Not strictly related, but I've heard some rumblings lately about the PGP
web of trust being harmful because it can expose activists' social
networks.
A valid concern. If you hate social graphs, don't publish your key
and ask that your
Hi, Gabriella. Hi, list. David Meyer wrote one for us (techPresident) which
I thought was quite good ... I am remote right now, so sadly no link.
Best,
Nick Judd
-Original message-
From: Yosem Companys compa...@stanford.edu
To: Liberation Technologies liberationtech
86 matches
Mail list logo